CN112861102A - Block chain-based electronic file processing method and system - Google Patents

Block chain-based electronic file processing method and system Download PDF

Info

Publication number
CN112861102A
CN112861102A CN202110269809.4A CN202110269809A CN112861102A CN 112861102 A CN112861102 A CN 112861102A CN 202110269809 A CN202110269809 A CN 202110269809A CN 112861102 A CN112861102 A CN 112861102A
Authority
CN
China
Prior art keywords
user terminal
account
file
electronic file
target electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110269809.4A
Other languages
Chinese (zh)
Other versions
CN112861102B (en
Inventor
王晓亮
张亚宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Rivtower Technology Co Ltd
Original Assignee
Hangzhou Rivtower Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Rivtower Technology Co Ltd filed Critical Hangzhou Rivtower Technology Co Ltd
Priority to CN202110269809.4A priority Critical patent/CN112861102B/en
Publication of CN112861102A publication Critical patent/CN112861102A/en
Application granted granted Critical
Publication of CN112861102B publication Critical patent/CN112861102B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

One or more embodiments of the present specification disclose a method and a system for processing an electronic file based on a blockchain, the method including: based on a disposable random key of a first account which currently has a target electronic file, a first user terminal encrypts the target electronic file and stores a ciphertext result to a distributed database; then, receiving a storage path returned by the distributed database after the storage is finished, and determining fingerprint data of the target electronic file; and then, the constructed contract is sent to a block chain after a transaction signature is created so as to create a file asset contract corresponding to the target electronic file. Therefore, the valuable electronic file is converted into the digital assets on the chain in the mode of the certification-through contract to carry out value transfer, the risks of loss, imitation, poor timeliness and the like possibly existing in the actual transfer process of the paper file are effectively avoided, and the credible transfer efficiency of the electronic file and the safety of transfer processing are improved.

Description

Block chain-based electronic file processing method and system
Technical Field
The present invention relates to the field of blockchain technologies, and in particular, to a method and a system for processing an electronic file based on a blockchain.
Background
The blockchain is a decentralized and innovative solution for solving the multi-party trust problem by using a distributed book technology, and is a leading-edge technology of the current society.
Currently, for valuable paper contracts, paper documents (e.g., trade orders, shipping bills), etc., these documents are all streamed (e.g., saved, viewed, and transferred) in paper form. The defects of easy loss, easy imitation, slow transmission and the like of the traditional paper file are considered. And a large amount of time, labor and material cost is consumed for layer-by-layer cargo inspection and document verification.
When the valuable files are converted into electronic files and are processed by the traditional internet system, the security problems of easy counterfeiting, tampering and the like still exist, and the security of electronic file circulation processing cannot be ensured.
Disclosure of Invention
One or more embodiments of the present disclosure are to provide a method and a system for processing an electronic file based on a block chain, so as to effectively avoid risks of loss, imitation, poor timeliness and the like that may exist in an actual circulation process of a paper file by converting a valuable electronic file into a digital asset on a chain in a manner of a certified contract for value circulation, and improve trusted circulation efficiency of the electronic file and security of circulation processing.
To solve the above technical problem, one or more embodiments of the present specification are implemented as follows:
in a first aspect, a method for processing an electronic file based on a block chain is provided, including:
based on a disposable random key of a first account which currently has a target electronic file, a first user terminal encrypts the target electronic file and stores an encrypted ciphertext result to a distributed database;
the first user terminal receives a storage path returned by the distributed database after storage is completed, and determines fingerprint data of the target electronic file;
and the first user terminal creates a transaction signature for the contract at least carrying the fingerprint data and the storage path and then sends the transaction signature to a block chain so as to create a file asset contract corresponding to the target electronic file when the first account is determined to have the creation right, wherein the file asset contract is a certified intelligent contract recorded with the right of the file.
In a second aspect, a system for processing an electronic file based on a block chain is provided, including: a first user terminal, distributed data and a block chain;
based on a disposable random key of a first account which currently has a target electronic file, a first user terminal encrypts the target electronic file and stores an encrypted ciphertext result to a distributed database;
the first user terminal receives a storage path returned by the distributed database after storage is completed, and determines fingerprint data of the target electronic file;
and the first user terminal creates a transaction signature for the contract at least carrying the fingerprint data and the storage path and then sends the transaction signature to a block chain so as to create a file asset contract corresponding to the target electronic file when the first account is determined to have the creation right, wherein the file asset contract is a certified intelligent contract recorded with the right of the file.
In a third aspect, an electronic device is provided, including:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform:
based on a disposable random key of a first account which currently has a target electronic file, a first user terminal encrypts the target electronic file and stores an encrypted ciphertext result to a distributed database;
the first user terminal receives a storage path returned by the distributed database after storage is completed, and determines fingerprint data of the target electronic file;
and the first user terminal creates a transaction signature for the contract at least carrying the fingerprint data and the storage path and then sends the transaction signature to a block chain so as to create a file asset contract corresponding to the target electronic file when the first account is determined to have the creation right, wherein the file asset contract is a certified intelligent contract recorded with the right of the file.
In a fourth aspect, a computer-readable storage medium is presented, storing one or more programs which, when executed by an electronic device comprising a plurality of application programs, cause the electronic device to perform:
based on a disposable random key of a first account which currently has a target electronic file, a first user terminal encrypts the target electronic file and stores an encrypted ciphertext result to a distributed database;
the first user terminal receives a storage path returned by the distributed database after storage is completed, and determines fingerprint data of the target electronic file;
and the first user terminal creates a transaction signature for the contract at least carrying the fingerprint data and the storage path and then sends the transaction signature to a block chain so as to create a file asset contract corresponding to the target electronic file when the first account is determined to have the creation right, wherein the file asset contract is a certified intelligent contract recorded with the right of the file.
According to the technical scheme provided by one or more embodiments of the specification, by utilizing the characteristics of non-tampering and decentralization of the block chain, the valuable electronic file is converted into the digital assets on the chain in a manner of passing a certification contract to carry out value transfer, the risks of loss, imitation, poor timeliness and the like possibly existing in the actual transfer process of the paper file are effectively avoided, and the trusted transfer efficiency of the electronic file and the security of transfer processing are improved.
Drawings
In order to more clearly illustrate one or more embodiments or prior art solutions of the present specification, reference will now be made briefly to the attached drawings, which are needed in the description of one or more embodiments or prior art, and it should be apparent that the drawings in the description below are only some of the embodiments described in the specification, and that other drawings may be obtained by those skilled in the art without inventive exercise.
Fig. 1 is a schematic diagram of a system architecture according to a block chain-based processing scheme for an electronic file provided in an embodiment of the present specification.
Fig. 2a is a schematic step diagram of a method for processing an electronic file based on a block chain according to an embodiment of the present specification.
Fig. 2b is a second schematic step diagram of a method for processing an electronic file based on a block chain according to an embodiment of the present disclosure.
Fig. 3 is a schematic diagram illustrating steps of a blockchain consensus algorithm according to an embodiment of the present disclosure.
Fig. 4 is a schematic view of a processing flow of viewing an electronic document based on a block chain according to an embodiment of the present specification.
Fig. 5 is a schematic flowchart of ownership transfer of an electronic document based on a block chain according to an embodiment of the present specification.
Fig. 6 is a schematic structural diagram of an electronic device provided in an embodiment of the present specification.
Detailed Description
In order to make the technical solutions in the present specification better understood, the technical solutions in one or more embodiments of the present specification will be clearly and completely described below with reference to the accompanying drawings in one or more embodiments of the present specification, and it is obvious that the one or more embodiments described are only a part of the embodiments of the present specification, and not all embodiments. All other embodiments that can be derived by a person skilled in the art from one or more of the embodiments described herein without making any inventive step shall fall within the scope of protection of this document.
As described above, in order to solve the security of processing operations related to the streaming of valuable electronic files in various application scenarios, the embodiments of the present specification introduce a block chain technology, and ensure processing operations such as secure and trusted electronic file storage, shared view, ownership transfer, and the like by using the characteristics of non-falsification, decentralization, and the like. However, in the embodiment of the present specification, a valuable electronic file is not simply stored in a chain, but the valuable electronic file is converted into a chain digital asset in a manner of a certified contract to perform value transfer, so that the digital assets such as a trade order, a shipping bill and the like can realize value instant viewing, transferring and the like in a trusted environment based on multi-party cooperation, risks such as loss, imitation, poor timeliness and the like which may exist in an actual transfer process of a paper file are effectively avoided, and a process of trading the electronic file by the digital asset is programmable based on a block chain intelligent contract, so that the trusted transfer efficiency of the electronic file in the manner of the digital asset is greatly improved, and the security of transfer processing is improved.
Referring to fig. 1, a system architecture related to a block chain-based processing scheme for an electronic file provided in an embodiment of the present disclosure may mainly include:
a user terminal 102, a block chain 104, a distributed database 106, a platform server 108;
the user terminal 102 is an operation entry of a user, provides a convenient and easy-to-use interface and stores account basic data corresponding to the user, and the user terminal 102 is deployed and operated by each user. Each user can log in a corresponding user terminal through a respective account, and the user terminal can be a hardware electronic device or a software application program. The operation interface of the user terminal 102 may be configured with operation buttons such as save, view, and ownership transfer, and the first user performs different processing operations on the target electronic file by triggering different buttons. It should be appreciated that in this system architecture, the number of user terminals 102 is determined based on the number of users actually participating in the document processing scheme. For example, for a file saving process, only one user terminal 102 may participate in the implementation; for the file viewing process, at least two user terminals 102 may participate in the implementation, at least one of which is a viewer; for the file ownership transfer scheme, at least two user terminals 102 may participate in the implementation, and one user terminal 102 may serve as an acquirer.
Blockchain 104 may use a federation chain, selecting a plurality of neutral enterprises as maintainers of blockchain nodes; the adoption of the mode of the alliance chain can ensure the maintenance of multiple nodes, and under the condition of ensuring the multi-center of the block chain, the addition of the node uses a permission mechanism to ensure that the data in the alliance chain has certain privacy. Meanwhile, valuable electronic files are represented by the certified intelligent contracts, and operations such as circulation records, original file query, ownership transfer and the like can be executed on the contracts.
The distributed database 106 stores the original files of the user's valuable files and saves them in encrypted form. The distributed database selects a plurality of neutral organizations as maintenance parties, and only provides storage and archiving services, and cannot be deleted and modified.
The platform server 108 is only responsible for auxiliary functions such as notification, and the dependence of each party on the platform service party is reduced to the maximum extent.
Example one
Referring to fig. 2a, a schematic step diagram of a method for processing an electronic file based on a blockchain provided in an embodiment of the present specification is shown, it should be understood that the method can be applied to the system architecture shown in fig. 1, and secure and efficient processing of a valuable electronic file is achieved in a multi-party collaboration manner. The processing method may include the steps of:
step 202: based on a one-time random key of a first account which currently possesses a target electronic file, a first user terminal encrypts the target electronic file and stores an encrypted ciphertext result to a distributed database.
The first user logs in a first account through the client and uploads the electronic file in the operation interface. It should be understood that, in particular, related attribute information with respect to the target electronic file may be filled out, and such related attribute information may include: file type, notifier, etc. After confirming that the filling content is correct, the first user generates a disposable random key by using software or hardware, and safely stores the disposable random key by using hardware or software, wherein the symmetric key corresponds to the first account one by one during storage. The one-time random key used for encrypting the target electronic file may be a generated symmetric key or a public key in an asymmetric key. The first user triggers the first user terminal to encrypt the file content by using a public key in the disposable random asymmetric key pair of the first account, and the encrypted content is used as a ciphertext result to be uploaded to the distributed database. Or the first user triggers the first user terminal to encrypt the file content by using the disposable random symmetric key of the first account, and the encrypted content is used as a ciphertext result to be uploaded to the distributed database.
Step 204: and the first user terminal receives a storage path returned by the distributed database after the storage is finished, and determines the fingerprint data of the target electronic file.
After the distributed database returns the storage path of the target electronic file, the first user terminal locally stores the storage path; meanwhile, the first user terminal calculates fingerprint data of the target electronic file.
Step 206: and the first user terminal creates a transaction signature for the contract at least carrying the fingerprint data and the storage path and then sends the transaction signature to a block chain so as to create a file asset contract corresponding to the target electronic file when the first account is determined to have the creation right, wherein the file asset contract is a certified intelligent contract recorded with the right of the file.
In the embodiment of the present specification, the file asset contract mainly includes attributes such as fingerprint data, a file type, a file right to which the file belongs, and query right, where the fingerprint data is used to store a fingerprint of a target electronic file, the file type is used to represent a category of the target electronic file, the file right to which the file belongs is represented by an address of an owner of the target electronic file, and the query right is used to manage viewing rights of various attributes in the file asset contract.
After the first user terminal calculates the fingerprint of the target electronic file, the first user terminal deploys information such as fingerprint data, file types, storage paths, file ownership, query authority and the like to the block chain in a form of a certified contract. Specifically, the first user terminal constructs a transaction based on information such as fingerprint data, a storage path, a file right and the like, firstly, a public key of a first account is used for encrypting transaction content, a private key of the first account is used for signing an encryption result, and then the encryption result is sent to a block chain. After the block chain checks the transaction, according to the account information with the creation authority stored in the identity contract, when the first account corresponding to the received transaction is determined to have the creation authority, a file asset contract corresponding to the target electronic file is created on the block chain, wherein the file asset contract is a certified intelligent contract recorded with the right to which the file belongs.
Therefore, the valuable electronic file is converted into the digital assets on the chain in a way of a certified contract to carry out value transfer, so that the target electronic file can realize safe value storage in a trusted environment based on multi-party cooperation in the form of the digital assets, the risks of loss, imitation, poor timeliness and the like possibly existing in the actual transfer process of the paper file are effectively avoided, the process of trading the electronic file by the digital assets is programmable based on the block chain intelligent contract, and the flexibility is realized.
Further, based on the scheme shown in fig. 1, some target operations may also be performed on the target electronic file, and as shown in fig. 2b, after the file asset contract is created, the method further includes:
step 208: and the first user terminal encrypts the disposable random key of the first account by using the public key of the second account requesting to implement the target operation, and uploads the encrypted key ciphertext to the block chain.
After the digital asset is created on the blockchain in a file asset contract, some target operations requested by a second user (i.e., a user other than the first user) may also be performed on the digital asset. Accordingly, the first user terminal informs the second user terminal of a key used by the first account for decrypting the target electronic file, and specifically, the first user terminal can receive an operation request of the second user under the second account in an offline or online manner; and then, the first user terminal acquires the public key of the second account from the identity contract of the block chain, encrypts the disposable random key of the first account by using the public key of the second account requesting to implement the target operation, and uploads the encrypted key ciphertext to the block chain. It should be understood that the one-time random key of the first account involved in this step is used to decrypt the target electronic file. Then, corresponding to the above encryption scheme, the corresponding key for decryption may be a one-time random symmetric key, or a private key of a one-time random asymmetric key pair. It can be seen that, in the embodiments of the present specification, if the one-time random key is a symmetric key, then the keys in encryption and decryption are the same; if the one-time random key is an asymmetric key, a public key is used for encrypting the target electronic file, and a private key is used for decrypting the target electronic file.
Step 210: the second user terminal acquires the key ciphertext from the block chain and decrypts the key ciphertext by using the private key of the second account; and simultaneously, the second user terminal acquires the storage path of the target electronic file from the file asset contract.
After the first user terminal uploads the private key ciphertext to the block chain, the second user terminal can actively monitor the block chain, or the platform server monitors the block chain and notifies the second user terminal, or the first user terminal directly notifies the second user terminal, so that the second user terminal knows that the private key ciphertext is linked. Then, the second user terminal determines to acquire two elements of the target electronic file: a key used for encrypting the target electronic file and a storage path for storing a ciphertext result of the target electronic file.
Firstly, the key ciphertext is obtained from the blockchain, the private key of the second account of the user is used for decrypting the key ciphertext, and the private key or the symmetric key of the first account is obtained so as to facilitate subsequent decryption of the target electronic file stored in the distributed database as a ciphertext result.
Second, the second user terminal may obtain a storage path of the target electronic file from the created file asset contract.
Step 212: and when the second user terminal confirms that the second account is allowed to be inquired when target operation is implemented, the ciphertext result is obtained from the distributed database through the storage path, and the ciphertext result is decrypted by using the one-time random key of the first account obtained through decryption, so that the target electronic file is obtained.
The second user terminal allows the second account corresponding to the second user terminal to query the target electronic file when confirming that the target operation is implemented from the block chain, and then the ciphertext result can be obtained from the corresponding distributed database through the storage path, and then the ciphertext result is decrypted by using the private key or the symmetric key of the first account obtained in the step 210, and finally the target electronic file is obtained. It should be understood that, in the embodiment of the present specification, when the target operation is implemented, a certain account is allowed to query the target electronic file, which indicates that the account owns the right of the target electronic file or owns the viewing right of the target electronic file.
Based on the schemes shown in fig. 2a and fig. 2b, specific processing operations can be implemented according to different target operations.
1. The target operation is a view operation
After step 208, the method further comprises:
triggering the second account to be added into the viewing permission information of the file asset contract so that the second account has the permission to view the target electronic file;
in this way, when the step 212 obtains the ciphertext result from the distributed database through the storage path, the step may specifically include:
the second user terminal sends an access request to the distributed database through the storage path; the distributed database inquires whether a second account initiating the access request exists in the checking authority information from the block chain, and authorizes access when the second account initiating the access request exists; and the second user terminal accesses the distributed database and acquires the ciphertext result.
Further, after the viewing operation is completed, the second user terminal may authorize the authority to view the target electronic file to another account. In specific implementation, marks can be carried in service transactions corresponding to different users to distinguish whether the account viewing authority is obtained by secondary transfer or is directly authorized by all parties.
2. The target operation is an ownership transfer operation
After step 208, the method further comprises:
triggering to modify the owner of the file right in the file asset contract into a second account;
in this way, when the step 212 acquires the ciphertext result from the distributed database through the storage path, the method specifically includes:
the second user terminal sends an access request to the distributed database through the storage path; the distributed database inquires whether the owner of the right to which the file belongs is the second account from the file asset contract on the block chain, and authorizes access when the inquiry is received; and the second user terminal accesses the distributed database and acquires the ciphertext result.
In fact, in the embodiment of the present specification, the creation authority is recorded in an identity contract on a blockchain; after obtaining the target electronic file, the method further includes: triggering the addition of the second account in the identity contract by sending a transaction to the blockchain such that the second account has permission to transfer the target electronic file.
It should be understood that, after the target electronic file is processed in the manner of 1 or 2, the second user terminal may locally calculate the fingerprint data of the target electronic file, and compare the fingerprint data with the fingerprint data on the blockchain, so as to perform validity verification on the obtained target electronic file. If the comparison is consistent, the target electronic file is not modified, and if the comparison is inconsistent, the target electronic file is modified.
Optionally, in this embodiment of the present specification, the first user terminal manages the secret key in a manner of a hardware wallet; and/or storing a public key of a first account and a public key of at least one second account participating in processing operation on the target electronic file in the identity contract.
The identity contract is used for storing the identity of a participant on a chain, the identity on the chain is managed in an anonymous mode, and meanwhile the access right of the identity contract is strictly limited. The address of the participant on the chain is recorded in the identity contract, and part of the authority of the participant is defined, such as whether the participant has the authority to create documents and the like. The identity contract does not store the real identity information of the user, and the participants only participate in the chain governance in an anonymous mode. The on-chain identity and the real identity are respectively stored through the client of each party, and each party confirms the on-chain identity of the related party through out-of-chain communication, so that the privacy of the identity of each party can be ensured to the greatest extent. Meanwhile, in the identity contract, the encrypted public keys of all the participants are saved. The encrypted public key is added by each participant through the self-sending transaction of the client. After the user generates the encrypted public key, the private key is stored by itself and can be stored in a file or hardware, so that the security of the private key and the privacy of data are ensured.
It should be understood that the target electronic file referred to in the embodiments of the present description may be an electronic file of value such as a trade order, a shipping bill, a shipping manifest, an electronic contract, and the like.
The following describes the viewing operation and the ownership transfer operation, respectively, taking an electronic document as an example.
Referring to the viewing process shown in fig. 3, the viewing process may include:
step 302: the electronic document is encrypted using its own public key.
The first user terminal stores a disposable random asymmetric public and private key pair generated when the first user logs in by using a first account, and can encrypt the electronic document by using a self public key to obtain a ciphertext result.
Step 304: and sending the encrypted electronic document to a distributed database for storage.
And the first user terminal uploads the ciphertext result to the distributed database.
Step 306: the storage path is returned.
And the distributed database returns a storage path to the first user terminal, and the ciphertext result of the electronic document can be searched from the distributed database according to the storage path.
Step 308: and constructing the information such as the fingerprint data and the storage path of the electronic document into a transaction, and signing by using a private key of the electronic document.
The method comprises the steps of carrying out fingerprint calculation on an electronic document to obtain fingerprint data, constructing information such as the fingerprint data and a storage path into a transaction, and signing the transaction by using a first account private key.
Step 310: and sending the signed transaction to the block chain.
Step 312: a document asset contract is created.
Step 314: a request for viewing is sent.
The second user terminal may apply for viewing from the first user terminal when monitoring for an asset contract that the second user terminal wishes to view on the chain.
Step 316: the private key of the viewer is encrypted using the viewer's public key.
Step 318: the constructed encrypted transaction is sent to the blockchain.
Step 320: and adding the viewing authority of the second user terminal in the document asset contract of the block chain.
Step 322: the platform server notifies the second user terminal after monitoring.
Step 324: an authentication request is sent to the blockchain.
Step 326: and after the verification is passed, decrypting the block chain transaction to obtain a storage path of the private key and the ciphertext result of the first account.
Step 328: and obtaining the ciphertext result from the distributed database by using the storage path.
Step 330: and decrypting the ciphertext result by using the private key of the first account to obtain the electronic document.
Step 332: and generating fingerprint data of the electronic document, comparing the fingerprint data with the on-chain fingerprint data, and verifying whether the electronic document is modified.
So far, the viewing operation is completed.
Referring to the ownership transfer process shown in fig. 4, the ownership transfer process may include:
step 402: the electronic document is encrypted using its own symmetric key.
The first user terminal stores a disposable random symmetric key generated when the first user logs in by using the first account, and can encrypt the electronic document by using the symmetric key of the first user terminal to obtain a ciphertext result.
Step 404: and sending the encrypted electronic document to a distributed database for storage.
And the first user terminal uploads the ciphertext result to the distributed database.
Step 406: the storage path is returned.
And the distributed database returns a storage path to the first user terminal, and the ciphertext result of the electronic document can be searched from the distributed database according to the storage path.
Step 408: and constructing the fingerprint data, the storage path and other information of the electronic document into business transaction, and signing by using a private key of the electronic document.
The method comprises the steps of carrying out fingerprint calculation on an electronic document to obtain fingerprint data, constructing information such as the fingerprint data and a storage path into a transaction, and signing the transaction by using a first account private key.
Step 410: and sending the transaction after the encrypted signature to the block chain.
Step 412: a document asset contract is created.
Step 414: and sending the ownership transfer request.
The second user terminal may apply for the first user terminal when monitoring an asset contract on the chain for which it is desirable to obtain rights.
Step 416: the public key of the applicant is used for encrypting the own symmetric key.
That is, the public key of the second user terminal is obtained from the identity contract of the block chain, and the public key is used to encrypt the symmetric key of the first user terminal.
Step 418: the constructed encrypted transaction is sent to the blockchain.
Step 420: the ownership is modified to the second user in the document asset contract of the blockchain.
Step 422: the first user terminal notifies the second user terminal.
Step 424: an authentication request is sent to the blockchain.
Step 426: and after the verification is passed, decrypting the transaction of the block chain to obtain a storage path of the symmetric key and the ciphertext result of the first account.
Step 428: and obtaining the ciphertext result from the distributed database by using the storage path.
Step 430: and decrypting the ciphertext result by using the symmetric key of the first account to obtain the electronic document.
Step 432: and generating fingerprint data of the electronic document, comparing the fingerprint data with the on-chain fingerprint data, and verifying whether the electronic document is modified.
At this point, the ownership transfer operation is completed.
The embodiment of the specification introduces a block chain technology, and ensures safe and credible processing operations of electronic file storage, shared viewing, ownership transfer and the like by utilizing the characteristics of non-tampering, decentralization and the like. However, in the embodiment of the present specification, a valuable electronic file is not simply stored in a chain, but the valuable electronic file is converted into a chain digital asset in a manner of a certified contract to perform value transfer, so that the digital assets such as a trade order, a shipping bill and the like can realize value instant viewing, transferring and the like in a trusted environment based on multi-party cooperation, risks such as loss, imitation, poor timeliness and the like which may exist in an actual transfer process of a paper file are effectively avoided, and a process of trading the electronic file by the digital asset is programmable based on a block chain intelligent contract, so that the trusted transfer efficiency of the electronic file in the manner of the digital asset is greatly improved, and the security of transfer processing is improved.
Example two
Referring to fig. 5a, a block chain-based electronic file processing system provided for an embodiment of the present specification may include: a first user terminal 502, a distributed database 504, and a blockchain 506;
based on a one-time random key of a first account currently having a target electronic file, a first user terminal 502 encrypts the target electronic file and stores an encrypted ciphertext result to a distributed database 504;
the first user terminal 502 receives a storage path returned by the distributed database 504 after the storage is completed, and determines fingerprint data of the target electronic file;
the first user terminal 502 creates a transaction signature for the contract carrying at least the fingerprint data and the storage path, and then sends the transaction signature to the block chain 506, so as to create a file asset contract corresponding to the target electronic file when it is determined that the first account has a creation right, where the file asset contract is a certified intelligent contract in which the right to which the file belongs is recorded.
Referring to fig. 5b, the system further comprises: a second user terminal 508;
after creating the file management contract, the first user terminal 502 encrypts the one-time random key of the first account using the public key of the second account requesting to implement the target operation, and uploads the encrypted key ciphertext to the block chain 506;
the second user terminal 508 obtains the key ciphertext from the blockchain and decrypts the key ciphertext using the private key of the second account; meanwhile, the second user terminal 508 acquires the storage path of the target electronic file from the file asset contract;
when the second user terminal 508 confirms that the second account is allowed to be queried when the target operation is performed, the ciphertext result is obtained from the distributed database 504 through the storage path, and the ciphertext result is decrypted by using the one-time random key of the first account obtained through decryption, so that the target electronic file is obtained.
Optionally, as an embodiment, the target operation is a view operation;
after the first user terminal 502 uploads the encrypted private key ciphertext to the blockchain 506, triggering to add the second account to the viewing permission information of the file asset contract of the blockchain 506, so that the second account has a permission to view the target electronic file;
and the number of the first and second groups,
when the second user terminal 508 confirms that the second account is allowed to be queried when performing the target operation, and obtains the ciphertext result from the distributed database 504 through the storage path, the method specifically includes:
the second user terminal 508 sends an access request to the distributed database 504 via the storage path;
the distributed database 504 queries from the block chain 506 whether there is a second account in the viewing permission information that initiates the access request, and authorizes access when the query arrives;
the second user terminal 508 accesses the distributed database 504 and obtains the ciphertext result.
In a specific implementation manner of the embodiment of this specification, after obtaining the target electronic file, the second user terminal 508 is further configured to: and authorizing the permission of viewing the target electronic file to other accounts.
In yet another specific implementation manner of the embodiment of the present specification, the target operation is an ownership transfer operation;
after the first user terminal 502 uploads the encrypted private key ciphertext to the block chain 506, triggering to modify the owner of the file right in the file asset contract of the block chain 506 into a second account;
and the number of the first and second groups,
if the second user terminal 508 determines that the second account is allowed to be queried when performing the target operation, the obtaining of the ciphertext result from the distributed database 504 through the storage path specifically includes:
the second user terminal 508 sends an access request to the distributed database 504 via the storage path;
the distributed database 504 queries from the file asset contracts on the blockchain 506 whether the owner to which the file belongs is the second account and grants access when the query is received;
the second user terminal 508 accesses the distributed database 504 and obtains the ciphertext result.
In yet another specific implementation manner of the embodiment of the present specification, the creation authority is recorded in an identity contract on a blockchain;
after the target electronic file is obtained, the second user terminal further triggers the addition of the second account in the identity contract of the blockchain by sending a transaction to the blockchain.
In another specific implementation manner of the embodiment of this specification, after obtaining the target electronic file, the second user terminal is further configured to: and carrying out validity verification on the obtained target electronic file based on the fingerprint data on the block chain.
In another specific implementation manner of the embodiment of the present specification, the first user terminal manages the secret key in a hardware wallet manner; and/or storing a public key of a first account and a public key of at least one second account participating in processing operation on the target electronic file in the identity contract.
The embodiment of the specification introduces a block chain technology, and ensures safe and credible processing operations of electronic file storage, shared viewing, ownership transfer and the like by utilizing the characteristics of non-tampering, decentralization and the like. However, in the embodiment of the present specification, a valuable electronic file is not simply stored in a chain, but the valuable electronic file is converted into a chain digital asset in a manner of a certified contract to perform value transfer, so that the digital assets such as a trade order, a shipping bill and the like can realize value instant viewing, transferring and the like in a trusted environment based on multi-party cooperation, risks such as loss, imitation, poor timeliness and the like which may exist in an actual transfer process of a paper file are effectively avoided, and a process of trading the electronic file by the digital asset is programmable based on a block chain intelligent contract, so that the trusted transfer efficiency of the electronic file in the manner of the digital asset is greatly improved, and the security of transfer processing is improved.
EXAMPLE III
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present specification. Referring to fig. 6, at a hardware level, the electronic device includes a processor, and optionally further includes an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory, such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be connected to each other via an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 6, but that does not indicate only one bus or one type of bus.
And the memory is used for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads a corresponding computer program from the non-volatile memory into the memory and then runs the computer program, and forms any processing device in the processing system on a logic level. The processor is used for executing the program stored in the memory and is specifically used for executing the following operations:
based on a disposable random key of a first account which currently has a target electronic file, a first user terminal encrypts the target electronic file and stores an encrypted ciphertext result to a distributed database;
the first user terminal receives a storage path returned by the distributed database after storage is completed, and determines fingerprint data of the target electronic file;
and the first user terminal creates a transaction signature for the contract at least carrying the fingerprint data and the storage path and then sends the transaction signature to a block chain so as to create a file asset contract corresponding to the target electronic file when the first account is determined to have the creation right, wherein the file asset contract is a certified intelligent contract recorded with the right of the file.
The method performed by the apparatus according to the embodiment shown in fig. 2 of the present specification can be applied to or implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The methods, steps, and logic blocks disclosed in one or more embodiments of the present specification may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with one or more embodiments of the present disclosure may be embodied directly in hardware, in a software module executed by a hardware decoding processor, or in a combination of the hardware and software modules executed by a hardware decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
The electronic device may also execute the method of fig. 2 and implement the functions of the corresponding apparatus in the embodiment shown in fig. 2, which are not described herein again in this specification.
Of course, besides the software implementation, the electronic device of the embodiment of the present disclosure does not exclude other implementations, such as a logic device or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or a logic device.
The embodiment of the specification introduces a block chain technology, and ensures safe and credible processing operations of electronic file storage, shared viewing, ownership transfer and the like by utilizing the characteristics of non-tampering, decentralization and the like. However, in the embodiment of the present specification, a valuable electronic file is not simply stored in a chain, but the valuable electronic file is converted into a chain digital asset in a manner of a certified contract to perform value transfer, so that the digital assets such as a trade order, a shipping bill and the like can realize value instant viewing, transferring and the like in a trusted environment based on multi-party cooperation, risks such as loss, imitation, poor timeliness and the like which may exist in an actual transfer process of a paper file are effectively avoided, and a process of trading the electronic file by the digital asset is programmable based on a block chain intelligent contract, so that the trusted transfer efficiency of the electronic file in the manner of the digital asset is greatly improved, and the security of transfer processing is improved.
Example four
This specification embodiment also proposes a computer-readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a portable electronic device comprising a plurality of application programs, are capable of causing the portable electronic device to perform the method of the embodiment shown in fig. 2, and in particular for performing the method of:
based on a disposable random key of a first account which currently has a target electronic file, a first user terminal encrypts the target electronic file and stores an encrypted ciphertext result to a distributed database;
the first user terminal receives a storage path returned by the distributed database after storage is completed, and determines fingerprint data of the target electronic file;
and the first user terminal creates a transaction signature for the contract at least carrying the fingerprint data and the storage path and then sends the transaction signature to a block chain so as to create a file asset contract corresponding to the target electronic file when the first account is determined to have the creation right, wherein the file asset contract is a certified intelligent contract recorded with the right of the file.
The embodiment of the specification introduces a block chain technology, and ensures safe and credible processing operations of electronic file storage, shared viewing, ownership transfer and the like by utilizing the characteristics of non-tampering, decentralization and the like. However, in the embodiment of the present specification, a valuable electronic file is not simply stored in a chain, but the valuable electronic file is converted into a chain digital asset in a manner of a certified contract to perform value transfer, so that the digital assets such as a trade order, a shipping bill and the like can realize value instant viewing, transferring and the like in a trusted environment based on multi-party cooperation, risks such as loss, imitation, poor timeliness and the like which may exist in an actual transfer process of a paper file are effectively avoided, and a process of trading the electronic file by the digital asset is programmable based on a block chain intelligent contract, so that the trusted transfer efficiency of the electronic file in the manner of the digital asset is greatly improved, and the security of transfer processing is improved.
In short, the above description is only a preferred embodiment of the present disclosure, and is not intended to limit the scope of the present disclosure. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present specification shall be included in the protection scope of the present specification.
The system, apparatus, module or unit illustrated in one or more of the above embodiments may be implemented by a computer chip or an entity, or by an article of manufacture with a certain functionality. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.

Claims (16)

1. A method for processing an electronic file based on a block chain comprises the following steps:
based on a disposable random key of a first account which currently has a target electronic file, a first user terminal encrypts the target electronic file and stores an encrypted ciphertext result to a distributed database;
the first user terminal receives a storage path returned by the distributed database after storage is completed, and determines fingerprint data of the target electronic file;
and the first user terminal creates a transaction signature for the contract at least carrying the fingerprint data and the storage path and then sends the transaction signature to a block chain so as to create a file asset contract corresponding to the target electronic file when the first account is determined to have the creation right, wherein the file asset contract is a certified intelligent contract recorded with the right of the file.
2. The processing method of claim 1, after creating the file management contract, the method further comprising:
the first user terminal encrypts a disposable random key of the first account by using a public key of a second account requesting to implement target operation, and uploads an encrypted key ciphertext to a block chain;
the second user terminal acquires the key ciphertext from the block chain and decrypts the key ciphertext by using the private key of the second account; meanwhile, the second user terminal acquires the storage path of the target electronic file from the file asset contract;
and when the second user terminal confirms that the second account is allowed to be inquired when target operation is implemented, the ciphertext result is obtained from the distributed database through the storage path, and the ciphertext result is decrypted by using the one-time random key of the first account obtained through decryption, so that the target electronic file is obtained.
3. The processing method of claim 2, the target operation being a view operation;
after the first user terminal uploads the encrypted key ciphertext to the blockchain, the method further includes:
triggering the second account to be added into the viewing permission information of the file asset contract so that the second account has the permission to view the target electronic file;
and the number of the first and second groups,
when the second user terminal confirms that the second account is allowed to be queried when the target operation is implemented, the ciphertext result is obtained from the distributed database through the storage path, and the method specifically includes:
the second user terminal sends an access request to the distributed database through the storage path;
the distributed database inquires whether a second account initiating the access request exists in the viewing authority information from the file asset contract on the block chain, and authorizes access when the inquiry is received;
and the second user terminal accesses the distributed database and acquires the ciphertext result.
4. The processing method of claim 3, after obtaining the target electronic file, the method further comprising:
and the second user terminal authorizes the permission of viewing the target electronic file to other accounts.
5. The processing method of claim 2, the target operation being a ownership transfer operation;
after the first user terminal uploads the encrypted key ciphertext to the blockchain, the method further includes:
triggering to modify the owner of the file right in the file asset contract into a second account;
and the number of the first and second groups,
when the second user terminal confirms that the second account is allowed to be queried when the target operation is implemented, the ciphertext result is obtained from the distributed database through the storage path, and the method specifically includes:
the second user terminal sends an access request to the distributed database through the storage path;
the distributed database inquires whether the owner of the right to which the file belongs is the second account from the file asset contract on the block chain, and authorizes access when the inquiry is received;
and the second user terminal accesses the distributed database and acquires the ciphertext result.
6. The processing method of claim 5, wherein the creation rights are recorded in an identity contract on a blockchain;
after obtaining the target electronic file, the method further includes:
triggering the addition of the second account in the identity contract by sending a transaction to the blockchain.
7. The processing method of any one of claims 3-6, after obtaining the target electronic file, the method further comprising:
and the second user terminal carries out validity verification on the obtained target electronic file based on the fingerprint data on the block chain.
8. The processing method of claim 6, wherein the first user terminal manages the key in a hardware wallet manner;
and/or the presence of a gas in the gas,
and storing public keys of a first account and at least one second account participating in processing operation on the target electronic file in the identity contract.
9. A system for processing an electronic file based on a blockchain, comprising: a first user terminal, a distributed database and a block chain;
based on a disposable random key of a first account which currently has a target electronic file, a first user terminal encrypts the target electronic file and stores an encrypted ciphertext result to a distributed database;
the first user terminal receives a storage path returned by the distributed database after storage is completed, and determines fingerprint data of the target electronic file;
and the first user terminal creates a transaction signature for the contract at least carrying the fingerprint data and the storage path and then sends the transaction signature to a block chain so as to create a file asset contract corresponding to the target electronic file when the first account is determined to have the creation right, wherein the file asset contract is a certified intelligent contract recorded with the right of the file.
10. The processing system of claim 9, the system further comprising: a second user terminal;
after the file management contract is created, the first user terminal encrypts a one-time random key of the first account by using a public key of a second account requesting to implement target operation, and uploads an encrypted key ciphertext to a block chain;
the second user terminal acquires the key ciphertext from the block chain and decrypts the key ciphertext by using the private key of the second account; meanwhile, the second user terminal acquires the storage path of the target electronic file from the file asset contract;
and when the second user terminal confirms that the second account is allowed to be inquired when target operation is implemented, the ciphertext result is obtained from the distributed database through the storage path, and the ciphertext result is decrypted by using the private key of the first account obtained through decryption to obtain the target electronic file.
11. The processing system of claim 10, the target operation being a view operation;
after the encrypted key ciphertext is uploaded to the block chain by the first user terminal, triggering the second account to be added to the viewing permission information of the file asset contract of the block chain, so that the second account has the permission to view the target electronic file;
and the number of the first and second groups,
when the second user terminal confirms that the second account is allowed to be queried when performing the target operation, and obtains the ciphertext result from the distributed database through the storage path, the method specifically includes:
the second user terminal sends an access request to the distributed database through the storage path;
the distributed database inquires whether a second account initiating the access request exists in the viewing authority information from the file asset contract on the block chain, and authorizes access when the inquiry is received;
and the second user terminal accesses the distributed database and acquires the ciphertext result.
12. The processing system of claim 11, the second user terminal, after obtaining the target electronic file, further to:
and authorizing the permission of viewing the target electronic file to other accounts.
13. The processing system of claim 10, the target operation being a ownership transfer operation;
after the encrypted key ciphertext is uploaded to the block chain by the first user terminal, triggering to modify an owner of the file right in the file asset contract of the block chain into a second account;
and the number of the first and second groups,
when the second user terminal confirms that the second account is allowed to be queried when the target operation is implemented, the ciphertext result is obtained from the distributed database through the storage path, and the method specifically includes:
the second user terminal sends an access request to the distributed database through the storage path;
the distributed database inquires whether the owner of the right to which the file belongs is the second account from the file asset contract on the block chain, and authorizes access when the inquiry is received;
and the second user terminal accesses the distributed database and acquires the ciphertext result.
14. The processing system of claim 13, wherein the creation rights are recorded in an identity contract on a blockchain;
after the target electronic file is obtained, the second user terminal further triggers the addition of the second account in the identity contract of the blockchain by sending a transaction to the blockchain.
15. The processing system of any of claims 11-14, after obtaining the target electronic file, the second user terminal further to:
and carrying out validity verification on the obtained target electronic file based on the fingerprint data on the block chain.
16. The processing system of claim 14, wherein the first user terminal manages the key in a hardware wallet;
and/or the presence of a gas in the gas,
and storing public keys of a first account and at least one second account participating in processing operation on the target electronic file in the identity contract.
CN202110269809.4A 2021-03-12 2021-03-12 Method and system for processing electronic file based on block chain Active CN112861102B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110269809.4A CN112861102B (en) 2021-03-12 2021-03-12 Method and system for processing electronic file based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110269809.4A CN112861102B (en) 2021-03-12 2021-03-12 Method and system for processing electronic file based on block chain

Publications (2)

Publication Number Publication Date
CN112861102A true CN112861102A (en) 2021-05-28
CN112861102B CN112861102B (en) 2024-02-06

Family

ID=75994222

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110269809.4A Active CN112861102B (en) 2021-03-12 2021-03-12 Method and system for processing electronic file based on block chain

Country Status (1)

Country Link
CN (1) CN112861102B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113360953A (en) * 2021-06-03 2021-09-07 上海和数软件有限公司 File distributed storage management method and system based on IPFS and block chain
CN113704734A (en) * 2021-07-14 2021-11-26 杭州溪塔科技有限公司 Distributed digital identity-based method for realizing certificate verification and related device
CN113723059A (en) * 2021-07-29 2021-11-30 微易签(杭州)科技有限公司 Method and system for converting HTML (hypertext markup language) into PDF (Portable document Format) based on block chain

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170243193A1 (en) * 2016-02-18 2017-08-24 Skuchain, Inc. Hybrid blockchain
CN110046521A (en) * 2019-04-24 2019-07-23 成都派沃特科技股份有限公司 Decentralization method for secret protection
CN110580418A (en) * 2019-11-08 2019-12-17 支付宝(杭州)信息技术有限公司 Private data query method and device based on block chain account
CN110990486A (en) * 2019-11-29 2020-04-10 北京有名知行科技有限公司 Block link evidence issuing and storing method and device based on network data interaction
CN111008228A (en) * 2020-03-09 2020-04-14 支付宝(杭州)信息技术有限公司 Method and device for inquiring account privacy information in block chain
CN111709860A (en) * 2020-06-19 2020-09-25 北京海益同展信息科技有限公司 Homote advice processing method, device, equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170243193A1 (en) * 2016-02-18 2017-08-24 Skuchain, Inc. Hybrid blockchain
CN110046521A (en) * 2019-04-24 2019-07-23 成都派沃特科技股份有限公司 Decentralization method for secret protection
CN110580418A (en) * 2019-11-08 2019-12-17 支付宝(杭州)信息技术有限公司 Private data query method and device based on block chain account
CN110990486A (en) * 2019-11-29 2020-04-10 北京有名知行科技有限公司 Block link evidence issuing and storing method and device based on network data interaction
CN111008228A (en) * 2020-03-09 2020-04-14 支付宝(杭州)信息技术有限公司 Method and device for inquiring account privacy information in block chain
CN111709860A (en) * 2020-06-19 2020-09-25 北京海益同展信息科技有限公司 Homote advice processing method, device, equipment and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113360953A (en) * 2021-06-03 2021-09-07 上海和数软件有限公司 File distributed storage management method and system based on IPFS and block chain
CN113704734A (en) * 2021-07-14 2021-11-26 杭州溪塔科技有限公司 Distributed digital identity-based method for realizing certificate verification and related device
CN113723059A (en) * 2021-07-29 2021-11-30 微易签(杭州)科技有限公司 Method and system for converting HTML (hypertext markup language) into PDF (Portable document Format) based on block chain

Also Published As

Publication number Publication date
CN112861102B (en) 2024-02-06

Similar Documents

Publication Publication Date Title
US11025435B2 (en) System and method for blockchain-based cross-entity authentication
US11533164B2 (en) System and method for blockchain-based cross-entity authentication
JP6873270B2 (en) Handling of transaction activities based on smart contracts in the blockchain Caution Methods and devices for protecting data
TWI709314B (en) Data processing method and device
CN109274652B (en) Identity information verification system, method and device and computer storage medium
US20200084045A1 (en) Establishing provenance of digital assets using blockchain system
US20150047003A1 (en) Verification authority and method therefor
CN112861102A (en) Block chain-based electronic file processing method and system
US11824971B2 (en) Peer-to-peer transmission system with a controlled, double-tier cryptographic key structure
CN111651794A (en) Alliance chain-based electronic data management method and device and storage medium
WO2023207086A1 (en) Blockchain-based user data transfer method, apparatus and device
CN113704210A (en) Data sharing method and electronic equipment
US20230360047A1 (en) Verification system and method
Feng et al. Blockchain Data Privacy Protection and Sharing Scheme Based on Zero‐Knowledge Proof
CN111683082A (en) Data sharing method and system based on block chain and electronic equipment
CN114266069B (en) House transaction electronic data sharing system and method based on blockchain technology
CN112231769A (en) Block chain-based numerical verification method and device, computer equipment and medium
JP2023527811A (en) Method, apparatus, and computer readable medium for authentication and authorization of networked data transactions
US20090193520A1 (en) System and method for providing reputation reciprocity with anonymous identities
GB2599416A (en) Authentication system and method
CN113486122A (en) Data sharing method and electronic equipment
WO2024123889A1 (en) Systems and methods for conducting and enforcing cryptographically secure actions in public, non-permissioned blockchains using bifurcated self-executing programs comprising shared digital signature requirements
Cai et al. Socialchain: Decoupling social data and applications to return your data ownership
CN111078649A (en) Block chain-based on-cloud file storage method and device and electronic equipment
US20240202718A1 (en) Blockchain based system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant